Your Evolving Home Network

Our building recently upgraded to 100 MB per unit internet using “microwave fixed wireless” rather than the traditional AT&T / Verizon / fiber solution. Here and here I wrote about this incredible technology and its potential to disrupt the cable and internet industries.

After the upgrade we were receiving screaming fast performance from wired connections but slower ping and downloads on my wireless clients. Thus I asked my friend Brian for a wireless router recommendation and he mentioned the TP Link Archer A9. I picked it up on Amazon for $129 and recently hooked it up. With all the security threats that abound, it is important that you have a modern network router and are aware of weak security points on your network, particularly some of the new “Internet of Things” devices that are proliferating nowadays.

Routers have changed significantly over the last few years in terms of power, capabilities, and ease of use. For instance the A9 has a simple console when you sign in and you can “hover over” and see your wired and wireless connections that are currently on your network. They have a cool error page and I am just starting to dig in to the various errors that I see on the panel and will be working with my ISP to resolve them – these aren’t typical “errors” in that the internet doesn’t work, but I do believe that frequent connections and re-connections and slower link times are caused by these events.

Read more

In Light of This Development …

Covered here, at length, I am certain that New Mexico, or at the very least, the Hidalgo County PD needs a new motto. This takes ‘search and seizure to whole new levels. I’ve seen this story linked on a couple of different independent blogs, but now it goes to a whole new level of ‘WTF?’

Read more

Obama, NSA Surveillance, and the Future of the American Information Technology Industry

I’m currently reading 1913: In Search of the World Before the Great War, by Charles Emmerson. The book describes the social and political climates then existing not only in the major European countries, but also in other places around the world, ranging from Australia to Canada to China.

In his description of Jerusalem–then under control of the Ottoman Empire but with a population including residents and pilgrims from many countries–the author says:

Different countries even had their own postal services, circumventing the Ottoman telegraph service, which was widely thought to be a nest of spies reporting communications back to Constantinople.

Fast forward 100 years….In the wake of the reports concerning NSA surveillance programs, there is widespread concern..among non-Americans as well as among citizens of this country…that the American telecommunications and information-processing services may be “a nest of spies” reporting communications back to Washington…and from there, possibly, to other shadowy recipients. These concerns may have serious economic ramifications.

See, for example, Forbes–NSA Surveillance Threatens US Competitiveness:

Non-US customers of any US business will immediately evaluate their exposure to these new risks and look for alternatives. European, Canadian, and Australian tech companies will profit from this. Competitors in those regions will offer alternatives that will also draw US customers away from the compromised US services.

Washington Post–European Leaders Raise Concerns on US Surveillance

“The German business community is on high alert,” said Volker Perthes, director of the German Institute for International and Security Affairs. “It’s not just about listening in on some bearded guy from Ulm who bought a ticket to Afghanistan and makes conversation with his friends in Waziristan. . . . The suspicion in large parts of the business sector is that Americans would also be interested in our patent applications.”

Popular Mechanics–Why the NSA Prism Program Could Kill US Tech Companies:

Think for a second about just how the U.S. economy has changed in the last 40 years. While a large percentage of our economy is still based in manufacturing, some of the most ascendant U.S. companies since the 1970s have been in the information technology sector…

Let’s say you ran a business in (Japan, India, Australia, Mexico, or Brazil)  that relied upon information services from a U.S. company. Don’t these revelations make using such a service a business liability? 

See also Business Insider–Did Obama Just Destroy the US Internet Industry?

 

I don’t think these revelations, even if they are fully validated, will really “kill” US tech companies or “destroy” the US Internet industry…the headlines are a bit over the top, as headlines often are. I do believe, however, that the American information technology industries will be significantly harmed, with implications for the entire US economy…something that we really cannot afford at this particular point in time.

I think it is obvious that the US government needs to conduct anti-terrorist surveillance programs, which must encompass telecommunications networks…the idea that NSA should be abolished, as some have suggested in recent days, is to my mind very unwise. But non-Americans as well as Americans have every right to be concerned about the scope of what has apparently been going on, and the apparent lack of proper controls, and furthermore, to raise questions about how the information gathered is actually being used.

Read more

Security Theater

“Those who would give up essential liberty to purchase a little temporary safety deserve neither liberty nor safety.” Benjamin Franklin.

“The president has put in place an organization that contains the kind of database that no one has ever seen before in life. That’s going to be very, very powerful. That database will have information about everything on every individual in ways that it’s never been done before.” Rep. Maxine Waters

Who expected that 1984 has arrived? I recall that in the actual year of 1984, a great many commenters in the political arena rejoiced that the whole Big Brother thing had not arrived, but it looks like such rejoicing was premature. Now we have the NSA collecting telephone records from Verizon wholesale for the ostensible purpose of security reasons … not so much for tracking specific suspected terrorists, but rather for data-mining … and very likely for opposition research. The revelations of the IRS stalling Tea Party groups’ applications for 501 status? Almost certainly this distracted or discouraged those groups from going all-out in last year’s election season, which I believe was the primary purpose.

Read more

Prefiguring the Hacker…and the American Surveillance Society

Perhaps the first piece of fiction to feature a computer-systems hacker is Poul Anderson’s 1953 story Sam HallPlace and date of birth. Parents. Race. Religion. Educational, military, and civilian service records…The total signal goes out over the wires. Accompanies by a thousand others, it shoots down the last cable and into the sorter unit of Central Records. The distorted molecules in a particular spool show the pattern of Citizen Blank, and this is sent back. It enters the comparison unit, to which the incoming signal corresponding to him has also been shunted. The two are perfectly in phase; nothing wrong. Citizen Blank is staying in the town where, last night, he said he would, so he has not had to file a correction.

Thornberg has certain reservations about the totalitarian regime which is now running America, but he is not actively disloyal. His political awakening begins when Jimmy, the son of his second cousin, is arrested on suspicion of treason, and Thornberg remembers some of the forbidden history which he has read.

The intellectuals had been fretful about the Americanization of Europe, the crumbling of old culture before the mechanized barbarism of soft drinks, hard sells, enormous chrome-plated automobiles (dollar grins, the Danes had called them), chewing gum, plastics…None of them had protested the simultaneous Europeanization of America: bloated government, unlimited armament, official nosiness, censors, secret police, chauvinism…

In order to protect the career of his son Jack, an officer in the regime’s military…as well as his own career…Thornberg decides to alter Matilda’s records and delete any relationship with the arrested Jimmy.

Thornberg toiled at the screens and buttons for an hour, erasing, changing. The job was tough; he had to go back several generations, altering lines of descent. But when he was finished, James Obrenowicz had no kinship whatever to the Thornbergs…He slapped the switch that returned the spool to the memory banks. With this act do I disown thee.

Thornberg’s rising bitterness reminds him of an old English ballad:

My name it is Sam Hall
And I hate you one and all

…and he uses his access to Matilda to create records for a fictional citizen by that name, a tough kid who has held a variety of unskilled jobs. Thornberg initially creates Sam Hall only as an outlet for his anger and to prove to himself that he can do it…but when a probably-innocent man is arrested for murder of a security officer…and Thornberg knows the man will be found guilty, whatever the true facts, in order to protect Security’s reputation for infallibility…he decides to establish a trail of records that will implicate the fictional Sam Hall as the murderer.

This is the beginning of Sam Hall’s career of murder and mayhem, as Thornberg repeatedly alters records to identify his fictional citizen as the author of real crimes across the country. Sam Hall is soon promoted to Public Enemy Number One…and his exploits soon inspire a range of copycat crimes against the government, with the attackers identifying themselves as “Sam Hall.”

The “Sam Hall” meme soon grows into a full-scale rebellion against the government. Thornberg helps things along by using his access to Matilda to spread mutual suspicion among government officials, turning the widespread distrust which is a feature of totalitarian societies against the regime itself.

Eventually, the rebels triumph and the totalitarian regime that is ruling America is overthrown. It seems a happy ending. Thornberg looks forward to destroying Matilda (after she is used one last time on behalf of the rebels “to help us find some people rather badly want” and “to transcribe a lot of information..strictly practical facts”) and to retiring Sam Hall to “whatever Valhalla there is for great characters of fiction.”

The story ends with the following sentence:

Unfortunately the conclusion is rugged. Sam Hall never was satisfied.

I wonder what on earth could possibly have reminded me of this old SF story?